Difference between revisions of "MITRE ATT&CK"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 3: Line 3:
The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. <ref name=”RE1”>"MITRE ATT&CK" - Abrufbar unter: https://www.mitre.org/focus-areas/cybersecurity/mitre-attack</ref>
The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. <ref name=”RE1”>"MITRE ATT&CK" - Abrufbar unter: https://www.mitre.org/focus-areas/cybersecurity/mitre-attack</ref>


==MITRE ATT&CK Groups==
==MITRE ATT&CK Software==
==MITRE ATT&CK Tactics==
==MITRE ATT&CK Techniques==


==MITRE ATT&CK Matrix for Enterprise==
==MITRE ATT&CK Matrix for Enterprise==

Revision as of 07:48, 3 January 2024

Introduction

Developed by MITRE, ATT&CK is a globally accessible knowledge base focused on adversary behaviour. Cyber adversaries are notorious for their intelligence, adaptability, and persistence, learning from each attack, whether successful or unsuccessful. Their capabilities range from stealing personal information to disrupting critical infrastructure and damaging business operations. The MITRE ATT&CK knowledge-base is freely available to everyone. THE MITRE ATT&CK knowledge base documents the common tactics, techniques and procedures used by cyber adversaries. It can serve as a valuable resource for the development of specific threat models and methodologies. [1]

MITRE ATT&CK Groups

MITRE ATT&CK Software

MITRE ATT&CK Tactics

MITRE ATT&CK Techniques

MITRE ATT&CK Matrix for Enterprise

Reconnaissance

Ressource Development

Initial Access

Execution

Persistence

Privilege Escalation

Defense Evasion

Credential Access

Discovery

Lateral Movement

Command and Controll

Exfiltration

Impact

References